Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp1779371ybh; Fri, 17 Jul 2020 00:23:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwOL7OoDlyq4RAHrdLAUVA95M/77gszyMX5euJZOwkiHtrPaWb3SR1V3QFqhXA9XI3WImT5 X-Received: by 2002:a17:906:70cf:: with SMTP id g15mr6888954ejk.531.1594970626028; Fri, 17 Jul 2020 00:23:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594970626; cv=none; d=google.com; s=arc-20160816; b=a6Xggi2Z+Wi29q85kKsFSvlJgNwn0C/1j4GcMqNTdyPdaqh4SJ7UTzh/UTxTuekjxo hxrm2Xx5t0hRz10YFnq3Ueuz8++431ryf4TvRtoA14/E0/qv4qN88KwU7BweyPwHm8er zz50M6kuKl2RPVW3qCQs5Mx02rJySY/sUjXFThKb0UTmiHCvBjb48g/TxgF4EdQGD8TD QRkpW363RwFsoLl+abXHYJxMD6haZkA56UN9gEn0D/iC4EkRwCUJW5+F1yrpTku6w3xS KqqD9WdhmohTONSGq9kapOisys8pAs7kilUT/DdgFx+GTQHUyfn/Y5gDaIb7HbxL3xv1 wtjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=aseZZ4Cekx6GI4/6ZBHLJOcvVlF0YlnU9yIRkjbqCws=; b=YSsAoEMzlOLqjrY1avto+G2mZDJEglhL2Tl1CyUBPvtQlTqSchk6MU+8DaVlamWjhO luBERBzBeVq96FO0FNNj+JMwUkxcEt5x8J/fDBtatItWbX4RHry65rVfMUNH4pV1bTt0 af7GQVnXijra3nm/1+1pG1jLhRfdQC93mkuW9O0LY7S0Fk5+9CQuDeCZRcunH8wKT4aT BKNJbXnB3mxgvdPcHUq4JzB299ANSzXtacFJID+EdRdjrSGrgJq1rcDOfbzmjD9tUt/S ujRQDEHgvQz0b4Qwq1kIngoPapJHLZCyY+nc1t/EpYbLwY5H0oDsgar6UmXKvvD3I8Uh 0QKg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t2si4343539ejd.382.2020.07.17.00.23.23; Fri, 17 Jul 2020 00:23:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728200AbgGQHWK (ORCPT + 99 others); Fri, 17 Jul 2020 03:22:10 -0400 Received: from mga17.intel.com ([192.55.52.151]:20243 "EHLO mga17.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728017AbgGQHVF (ORCPT ); Fri, 17 Jul 2020 03:21:05 -0400 IronPort-SDR: xbw9HOsH0CKThNWWvjalevgbyGZJ+oPXCU1v5yYYEbSX5fmrxdRos3zo08Ti5TJm128dYapz9F c6BIXzgWpOnw== X-IronPort-AV: E=McAfee;i="6000,8403,9684"; a="129632997" X-IronPort-AV: E=Sophos;i="5.75,362,1589266800"; d="scan'208";a="129632997" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 Jul 2020 00:21:04 -0700 IronPort-SDR: 4zwRcwamzur591b0APcoSq3hW8wylsw0cAqcpjKNMF8iH8HcKZLa37STEc1jY9FgE2B4hxhh1+ 0G1zRQBjWkzQ== X-IronPort-AV: E=Sophos;i="5.75,362,1589266800"; d="scan'208";a="361271089" Received: from iweiny-desk2.sc.intel.com (HELO localhost) ([10.3.52.147]) by orsmga001-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 Jul 2020 00:21:03 -0700 From: ira.weiny@intel.com To: Thomas Gleixner , Ingo Molnar , Borislav Petkov , Andy Lutomirski , Peter Zijlstra Cc: Fenghua Yu , x86@kernel.org, Dave Hansen , Dan Williams , Vishal Verma , Ira Weiny , Andrew Morton , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-nvdimm@lists.01.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-kselftest@vger.kernel.org Subject: [PATCH RFC V2 06/17] x86/pks: Add a debugfs file for allocated PKS keys Date: Fri, 17 Jul 2020 00:20:45 -0700 Message-Id: <20200717072056.73134-7-ira.weiny@intel.com> X-Mailer: git-send-email 2.28.0.rc0.12.gb6a658bd00c9 In-Reply-To: <20200717072056.73134-1-ira.weiny@intel.com> References: <20200717072056.73134-1-ira.weiny@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Fenghua Yu The sysadmin may need to know which PKS keys are currently being used. Add a debugfs file to show the allocated PKS keys and their names. Signed-off-by: Fenghua Yu --- arch/x86/mm/pkeys.c | 40 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 40 insertions(+) diff --git a/arch/x86/mm/pkeys.c b/arch/x86/mm/pkeys.c index 16f735c12fcd..e565fadd74d7 100644 --- a/arch/x86/mm/pkeys.c +++ b/arch/x86/mm/pkeys.c @@ -328,3 +328,43 @@ void pks_key_free(int pkey) mutex_unlock(&pks_lock); } EXPORT_SYMBOL_GPL(pks_key_free); + +static int pks_keys_allocated_show(struct seq_file *m, void *p) +{ + int i; + + mutex_lock(&pks_lock); + for (i = PKS_KERN_DEFAULT_KEY; i < PKS_NUM_KEYS; i++) { + /* It is ok for pks_key_users[i] to be NULL */ + if (test_bit(i, &pks_key_allocation_map)) + seq_printf(m, "%d: %s\n", i, pks_key_users[i]); + } + mutex_unlock(&pks_lock); + + return 0; +} + +static int pks_keys_allocated_open(struct inode *inode, struct file *file) +{ + return single_open(file, pks_keys_allocated_show, NULL); +} + +static const struct file_operations pks_keys_allocated_fops = { + .open = pks_keys_allocated_open, + .read = seq_read, + .llseek = seq_lseek, + .release = single_release, +}; + +static int __init pks_keys_initcall(void) +{ + if (cpu_feature_enabled(X86_FEATURE_PKS)) { + /* Create a debugfs file to show allocated PKS keys. */ + debugfs_create_file("pks_keys_allocated", 0400, + arch_debugfs_dir, NULL, + &pks_keys_allocated_fops); + } + + return 0; +} +late_initcall(pks_keys_initcall); -- 2.28.0.rc0.12.gb6a658bd00c9